GEN002740 - The audit system must be configured to audit file deletions - '/etc/security/audit/config FILE_Unlink exists'

Information

If the system is not configured to audit certain activities and write them to an audit log, it is more difficult to detect and track system compromises and damages incurred during a system compromise.

Solution

Edit /etc/security/audit/events and add the FILE_Unlink or FS_Rmdir events to the list of audited events.
Edit /etc/security/audit/config and add the FILE_Unlink and FS_Rmdir audit events to an audit class in the classes: stanza.
Edit the /etc/security/audit/config and assign the audit classes containing the FILE_Unlink and FS_Rmdir events to the all users listed in the users: stanza.

See Also

http://iasecontent.disa.mil/stigs/zip/U_STIG_Library_2015_07.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-2d., CAT|II, CCI|CCI-000126, Rule-ID|SV-27294r1_rule, STIG-ID|GEN002740, Vuln-ID|V-815

Plugin: Unix

Control ID: 049a6b63936649f56eab6efec2cc74294d133f7b5c78063aaafa252e690b0a06